ISSN ONLINE(2320-9801) PRINT (2320-9798)

Yakışıklı erkek tatil için bir beldeye gidiyor burada kendisine türk Porno güzel bir seksi kadın ayarlıyor Onunla beraber otel odasına gidiyorlar Otel odasına rokettube giren kadın ilk önce erkekle sohbet ederek işi yavaş halletmeye çalışıyor sex hikayeleri Kocası fabrikatör olan sarışın Rus hatun şehirden biraz uzak olan bir türk porno kasabaya son derece lüks bir villa yaptırıp yerleşiyor Kocasını işe gönderip mobil porno istediği erkeği eve atan Rus hatun son olarak fotoğraf çekimi yapmak üzere türk porno evine gelen genç adamı bahçede azdırıyor Güzel hatun zengin bir iş adamının porno indir dostu olmayı kabul ediyor Adamın kendisine aldığı yazlık evde sikiş kalmaya başlayan hatun bir süre sonra kendi erkek arkadaşlarını bir bir çağırarak onlarla porno izle yapıyor Son olarak çağırdığı arkadaşını kapıda üzerinde beyaz gömleğin açık sikiş düğmelerinden fışkıran dik memeleri ile karşılayıp içeri girer girmez sikiş dudaklarına yapışarak sevişiyor Evin her köşesine yayılan inleme seslerinin eşliğinde yorgun düşerek orgazm oluyor film izle

Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services

Amal Jose, M.Sambath, S.Ravi
  1. PG Scholar, Department of Computer Science & Engineering , Hindustan University, Chennai, India
  2. Assistant Professor, Department of Computer Science & Engineering , Hindustan University, Chennai, India
  3. Assistant Professor, Department of Computer Science & Engineering , Hindustan University, Chennai, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering

Abstract

Cloud Computing is the next-generation architecture of computing. It moves the software and databases to the large data centers, where the management of the data and services can face a number of challenges. By outsourcing data, users are free from the burden of local data storage and maintenance. However, since the users does not have physical possession of large size of outsourced data makes the data integrity protection in cloud computing a very challenging task for users. So public auditability for cloud data storage security is important where users can entrust an external audit party to check the integrity of outsources data when needed. To securely introduce an effective third party auditor (TPA), the following requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without the local copy of data, and should not introduce any additional on-line burden to the cloud user; 2) The third party auditing process should preserve user data privacy.

 

Keywords

public auditing, cloud service provider, thirdpartyauditng

INTRODUCTION

Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Because of number of advantages it offers cloud computing is looked upon as the architecture for next generation enterprises. Some of the advantages are on demand self service, usage based pricing, rapid resource elasticity, location independent resource pooling etc.Users have a number of appealing benefits such as universal data access, relief of burden of storage management, avoidance of capital expenditure on hardware ,software etc.Although cloud computing has a lot of advantages it also brings security threats towards user’s outsourced data. Many times correctness of data is put under risk since cloud service providers are separate administrative entities. The main threats to data are mainly due to the reasons described below. First of all there are internal and external threats even though cloud infrastructures are powerful and reliable. Secondly there are chances that cloud service provider behave unfaithfully towards outsourced data to cloud users. Since the users no longer have the possession of outsourced data it is necessary that the data is audited to ensure data integrity.Inorder to ensure data integrity and save cloud users computation resources it is of critical importance to enable public auditing service for cloud data storage so that users can resort to a third party auditor to audit outsourced data. Third party auditor provide easier and affordable way for users to ensure storage correctness and the audit result from third party auditor will also be beneficial for cloud service provider to improve cloud based service platform. By using public auditing services users can avoid risk and gain trust in cloud.To ensure remotely stored data integrity public auditability has been proposed which allow external party to audit data but most of the schemes do not consider privacy protection of user’s data. Here a privacy preserving public auditing protocol is proposed which enable an external auditor to audit data without learning the content. Batch auditing and data dynamics are also allowed. Public key based homomorphic linear authenticator which enables third party auditor to perform auditing without demanding local copy of data .By integrating homomorphic linear authenticator with random masking our protocol guarantees that third party auditor could not learn any knowledge about data content stored in cloud server during auditing processes.

RELATED WORK

Public auditability in provable data possession are first considered by Ateniese for possession of data files on untrusted storages. They utilize the RSA-based homomorphic linear authenticators for auditing outsourced data and suggest randomly sampling a few blocks of the file. However, among their two proposed schemes, the one with public auditability exposes the linear combination of sampled blocks to external auditor. When used directly, their protocol is not provably privacy preserving, and thus may leak user data information to the external auditor. Juels et al. [11] describe a “proof of retrievability”(PoR) model, where spot-checking and error-correcting codes are used to ensure both “possession” and “retrievability”of data files on remote archive service systems. However, the number of audit challenges a user can perform is fixed a priori, and public auditability is not supported in their main scheme. Although they describe a straightforward Merkle-tree construction for public PoRs, this approach only works with encrypted data. Later, Bowers et al. [18] proposean improved framework for POR protocols that generalizes Juels’ work. Shacham andWaters [13] design an improved PoR scheme built from BLS signatures [19] with proofs of security in the security model defined in [11]. Similar to the construction in [9], they use publicly verifiable homomorphic linear authenticators that are built from provably secure BLS signatures. Based on Comparison on auditing time between batch and individual auditing, when _-fraction of 256 responses are invalid: Per task auditing time denotes the total auditing time divided by the number of tasks. the elegant BLS construction, a compact and public verifiable scheme is obtained. Again, their approach is not privacy preserving due to the same reason as [9]. Shah et al. [15], [10]propose introducing a TPA to keep online storage honest by first encrypting the data then sending a number of precomputed symmetric-keyed hashes over the encrypted data to the auditor. The auditor verifies the integrity of the data file and the server’s possession of a previously committed decryption key. This scheme only works for encrypted files, requires the auditor to maintain state, and suffers from bounded usage, which potentially brings in online burden to users when the keyed hashes are used up. Dynamic data have also attracted attentions in the recent literature on efficiently providing the integrity guarantee of remotely stored data

PROBLEM STATEMENT

There are mainly four different entities involved that are called as cloud user, cloud service provider, cloud server and third party auditor. Cloud user have huge amount of data that has to be stored in the cloud. Cloud server is managed by cloud service provider to provide data storage service and has significant storage space and computational resources. Third party auditor is used to assess cloud storage service reliability on behalf of user upon request. User depend on cloud service provider to store data since user no longer possess data locally user need to ensure that data are being correctly stored and maintained. User’s data may face both internal and external attack at cloud server.Inorder to save computation resource as well as online burden of periodic storage correctness verification cloud users resort to a third party auditor to ensure storage integrity of outsourced data. Public auditability, storage correctness, privacy preserving, batch auditing and lightweight processing are the design goals to be achieved.

PROPOSED SCHEME

Public auditing scheme is discussed here. Two straight forward scheme and their demerits are also discussed. Then we present the main scheme which support batch auditing and data dynamics. Public auditing scheme provide complete outsourcing solution of data. There are mainly four algorithms in public auditing scheme. There are mainly four algorithm for public auditing keygen,siggen,genproof,verifyproof.Keygen is a keygeneration algorithm,sigen is used to generate verification metadata,genproof is used to generate proof of data storage correctness while verifyproof is run by third party auditor to audit the proof. Setup and audit are the two phases of running a public auditing system. In set up phase user initializes public and secret parameters of the system by executing keygen and preprocess the data file F by using siggen to generate the verification metadata. User then stores the data file F and the verification metadata at the cloud server and deletes it’s local copy. In audit phase an audit message or challenge to the cloud server to make sure that the cloud server has retained the data file F properly at the time of audit.
A. PRIVACY PRESERVING PUBLIC AUDUTING SCHEME
Homomorphic linear authenticator with random masking technique is used to achieve privacy preserving public auditing. The linear combination of sampled blocks in the server’s response is masked with randomness generated by the server. Even though many linear combinations of the same set of file blocks can be collected by using random masking, the third party auditor no longer has all the necessary information to build up a correct group of linear equations and therefore cannot derive the user’s data content. The design makes use of public key based homomorphic linear authenticator to equip auditing protocol with public auditability.
Let G1, G2 and Gt are multiplicative cyclic groups of prime order p and e: G1 x G2 →GT be a bilinear map and let g be a generator of G2..H(.) is a secure map-to-point hash function:{0,1}→ G1, which maps strings uniformly to G1. Another hash function h(.) : Gt→ZP maps group element of GT uniformly to Zp.
Setup Phase: The cloud user runs KeyGen to generate the public and secret parameters. Specifically, the user chooses a random signing key pair (spk,ssk), a random x ←Zp, a random element u GG1, and computes v gx.The secret parameter is sk=(x,ssk) and the public parameters are pk=(spk,v,g,u,e(u,v)).Given a data file F ={Mi}, the user runs SigGen to compute authenticator GG1 for each i.Here, Wi = name || i and name is chosen by the user uniformly at random from Zp as the identifier of file F.The last part of SigGen is for ensuring the integrity of the unique file identifier name.
Audit Phase: The TPA first retrieves the file tag t. With respect to the mechanism we describe in the Setup phase, the TPA verifies the signature SSigssk(name) via spk, and quits by emitting FALSE if the verification fails. Otherwise, the TPA recovers name. Now it comes to the “core” part of the auditing process. To generate the challenge message for the audit “chal,” the TPA picks a random c-element subset I = {s1,….sc} of set[1,n]. For each element i€I, the TPA also chooses a random value vi (of bit length that can be shorter than |p|, as explained in [13]). The message “chal” specifies the positions of the blocks required to be checked. The TPA sends chal = {(i,vi)} to the server. Upon receiving challenge chal= {(i,Vi)},the server runs GenProof to generate a response proof of data storage correctness. Specifically, the server chooses a random element r ←Zp, and calculates R = e(u,v)r G€T . Finally the third party auditor runs the verify proof to validate it by checking verification equation.
B.PROPERTIES OF PROTOCOL
Public auditability is achieved in the protocol and it does not pose any potential online burden on users. It supports privacy of user data by employing a random masking and linear combination of data blocks. Underlying protocol ensures storage correctness and HLA helps to achieve the constant communication overhead for server’s response during audit.O (1) is the probability to detect server misbehavior if the server is missing a fraction of data. Given the huge volume of data outsourced in the cloud, checking a portion of the data file is more affordable and practical for both the TPA and the cloud server than checking all the data, as long as the sampling strategies provides high-probability assurance.
C.SUPPORT FOR BATCH AUDUTING
Third party auditor can concurrently handle multiple auditing from different users delegation and thus supports batch auditing. If TPA audit the tasks individually it will be tedious and inefficient.
It is always advantageous for the TPA to batch multiple batches together and audit at one time. By aggregating K verification equations into single one a secure batch auditing protocol for simultaneous auditing of multiple tasks is obtained. There are two phase setup phase and audit phase. In setup phase basically; the users just perform Setup independently. Suppose there are K users in the system, and each user k has a data file Fk =(mk,1,…….,mk,n) to be outsourced to the cloud server, where k € (1; . . .;K). For simplicity, we assume each file Fk has the same number of n blocks. For a particular user k, denote his/her secret key as (xk; sskk), and the corresponding public parameter (spkk,vk,g,uk,e(uk,vk)) where vk = gxk . Similar to the single user case, each user k has already randomly chosen a different name k € Zp for his/her file Fk, and has correctly generated the corresponding file tag tk .Finally, each user k sends file Fk, set of authenticators ?k, and tag tk to the server and deletes them from local storage. In audit phase TPA retrieves and verifies file tag tk first for each user k.If verification fails TPA quits by emitting false otherwise TPA recovers namek and sends the audit challenge to the server for auditing data files of all K users.Effiecency improvement is the main advantage of batch auditing. It allows TPA to perform multiple tasks simultaneously but also greatly reduces computation cost on TPA side.Aggreagating K verification equations into one saves a considerable amount of auditing time.
D.SUPPORT FOR DATA DYNAMICS
Supporting data dynamics for privacy preserving public auditing is very important, outsourced data not only be accessed but also updated frequently by users for various application purposes. Data dynamics is achieved by replacing index information i with mi in computation of block authenticators and using merkle hash tree. As a result, the authenticator for each block is changed. We can adopt this technique in our design to achieve privacy-preserving public auditing with support of data dynamics. Specifically, in the Setup phase, the user has to generate and send the tree root TPA as additional metadata. In the Audit phase, the server’s response should also include corresponding auxiliary authentication information aux in the MHT. Upon receiving the response, TPA should first use TRMHT and aux to authenticate computed by the server. The Batch Auditing Protocol these changes does not interfere with the proposed random masking technique, so data privacy is still preserved. To support data dynamics, each data update would require the user to generate a new tree root TRMHT, which is later sent to TPA as the new metadata for storage auditing task. The details of handling dynamic operations are similar and thus omitted.

EVALUATION

The evaluation includes security analysis and performance analysis. Security of the proposed scheme is done by analyzing storage correctness and privacy preserving property.Seurity analysis include storage correctness gurantee,privacy preserving gurantee,batch auditing gurantee,sorting out invalid responses. Storage correctness guarantee ensures that if cloud server passes the audit phase it must indeed possess the specified data intact as it is. The TPA cannot derive user’s data from information during auditing; this is called as privacy preserving guarantee. The efficiency analysis on the batch auditing, is done by considering only the total number of pairing operations. However, on the practical side, there are additional less expensive operations required for batching, such as modular exponentiations and multiplications. Thus, whether the benefits of removing pairings significantly outweighs these additional operations remains to be verified. To get a complete view of batching efficiency, we conduct a timed batch auditing test, where the number of auditing tasks is increased from 1 to approximately 200 with intervals of 8.The performance of the corresponding non batched (individual) auditing is provided as a baseline for the measurement. It can be shown that compared to individual auditing, batch auditing indeed helps reducing the TPA’s computation cost, as more than 15 percent of per task auditing time is saved.

CONCLUSION

In this paper secure cloud storage privacy preserving public auditing system is proposed. Homomorphic linear authenticator and random masking is used to guarantee that the TPA would not learn any knowledge about the data content stored on the cloud server during the efficient auditing process, which not only eliminates the burden of cloud user from the tedious and possibly expensive auditing task, but also alleviates the users’ fear of their outsourced data leakage. Considering TPA may concurrently handle multiple audit sessions from different users for their outsourced data files, we extend our privacy-preserving public auditing protocol into a multiuser setting, where the TPA can perform multiple auditing tasks in a batch manner for better efficiency. Extensive analysis shows that our schemes are provably secure and highly efficient. The future extension is full fledged implementation of mechanism on commercial public cloud which can handle large amount of data and thus enable users to outsource the data more confidently.

Figures at a glance

Figure 1
Figure 1

References